Skip navigation

Tag Archives: pipal

Hello folks 🙂

A few days after the last post about the linkedin password leak and the quick analysis of the passwords I recovered, a friend of mine gave me a link to the eharmony password archive. This archive contains 1513836 md5 hashes. I had a very big surprise with this dump because when I started to work on it, I quickly noticed that all password were uppercased… Thanks eHarmony ! Just to remember, the number of combinations for a N characters length password made of a charset of C different letters is C^N. Here, the « standard » charset [A-Za-z0-9] (26+26+10=62 chars) becomes [A-Z0-9] (26+10=32, nearly half the previous charset).

Read More »